A security administrator wants to implement a system that will allow the organization to quickly and securely recover from a computer breach. The security
administrator notices that the majority of malware infections are caused by zero-day armored viruses and rootkits. Which of the following solutions should the
system administrator implement?
A.
 Install an antivirus solution that provides HIPS capabilities.
B.
 Implement a thick-client model with local snapshots.
C.
 Deploy an enterprise patch management system.
D.
 Enable the host-based firewall and remove users’ administrative rights.